Resilient Group Key Agreement Protocol with Authentication Security

被引:0
作者
Rajaram, M. [1 ]
Thilagavathy, D. [2 ]
Devi, N. Kanjana [2 ]
机构
[1] Govt Coll Engn, Thirunelveli, India
[2] Adhiyamaan Coll Engn, Hosur, India
来源
2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT) | 2010年
关键词
Authentication; dynamic peer groups; group key agreement; re-keying; secure group communication; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement and authentication protocol is required to handle this issue. Instead of performing individual re-keying operations, an interval-based approach of re-keying is adopted in the proposed scheme. The proposed interval based algorithms considered in this paper are Batch algorithm and the Queue-batch algorithm. The interval-based approach provides re-keying efficiency for dynamic peer groups while preserving both distributed and contributory properties. Performance of these interval-based algorithms under different settings, such as different join and leave probabilities, is analyzed The Queue-batch algorithm performs the best among the interval-based algorithms
引用
收藏
页数:6
相关论文
共 16 条
[1]   Secure group communication using robust contributory key agreement [J].
Amir, Y ;
Kim, Y ;
Nita-Rotaru, C ;
Schultz, JL ;
Stanton, J ;
Tsudik, G .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2004, 15 (05) :468-480
[2]  
Amir Y., 1998, CNDS984 JOHNS HOPK U
[3]  
Ateniese G., 1998, 5th ACM Conference on Computer and Communications Security, P17, DOI 10.1145/288090.288097
[4]  
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339
[5]  
Burmester M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P275, DOI 10.1007/BFb0053443
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
Fekete A., 1997, Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, P53, DOI 10.1145/259380.259422
[8]  
Gunther C.G., 1989, Advances in Cryptology-Eurocrypt, P29
[9]  
Just M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P36, DOI 10.1007/BFb0034833
[10]  
Kim Y., 2004, ACM Transactions on Information and Systems Security, V7, P60, DOI 10.1145/984334.984337